Menu
Home
About
Our Role
Goals
The Team
Roadmap
Tokenomics
How To Buy
Knowledge Base
Contacts
Sitemap & Links
A.I.
Chart
Shop
IMMORTALITY
🏠
⬇️
Botnet
New name
B
I
U
S
link
image
code
HTML
list
Show page
Syntax
Each client bot polls their IP address and port to the central bot. The client bot gets the current list of scammers. ~ The central bot can issue the command to all the client bots (to flood the server). https://github.com/topics/ddos-attack-tools?l=c The top 10 botnets currently... * Gafgyt: Gafgyt botnet made up more than half of the 2.8 million DDoS attacks tracked by NetScout in 1H 2021. It grew by 3.9 times in 2019, with a 34.5% increase in C&C servers. * Mirai: Mirai botnet, along with Gafgyt, made up more than half of the 2.8 million DDoS attacks tracked by NetScout in 1H 2021. * Fancy Lazarus: Fancy Lazarus DDoS extortion campaign kicked into high gear in 1H 2021, threatening organizations in multiple industries with a focus on ISPs and their authoritative DNS servers. * Gorilla Botnet: Gorilla Botnet launched over 300,000 DDoS attacks across 100 countries, targeting universities, government websites, telecoms, banks, gaming, and gambling sectors. * Emotet: Emotet botnet is still active, with a significant number of C&C servers hosted in the LatAm region. * TrickBot: TrickBot botnet is still active, with a significant number of C&C servers hosted in the LatAm region. * Zeus: Zeus botnet is still active, with a significant number of C&C servers hosted in the LatAm region. * Ryuk: Ryuk botnet is still active, with a significant number of C&C servers hosted in the LatAm region. * Qbot: Qbot botnet is still active, with a significant number of C&C servers hosted in the LatAm region. * Ramnit: Ramnit botnet is still active, with a significant number of C&C servers hosted in the LatAm region. Scam Websites Lists * https://db.aa419.org/fakebankslist.php Spam lists... * https://www.spamhaus.org/ * https://www.spamcop.net/ * https://github.com/jarelllama/Scam-Blocklist * https://gridinsoft.com/website-reputation-checker * https://github.com/scamsniffer/scam-database * https://botcrawl.com/domain-blacklist-checker/ * https://github.com/StevenBlack/hosts {html} <h1 class="entry-title col-2-3">Free Blocklists of Suspected Malicious IPs and URLs</h1></header><div class="main-content grid keyline-top"><div class="col-2-3"><div class="entry-content"><p>Several organizations maintain and publish free blocklists of IP addresses and URLs of systems and networks suspected in malicious activities on-line. Some of these lists have usage restrictions:</p><ul class="wp-block-list"><li><a href="https://db.aa419.org/fakebankslist.php">Artists Against 419</a>: Lists fraudulent websites</li><li><a href="https://atlas.arbor.net/">ATLAS from Arbor Networks</a>: Registration required by contacting Arbor</li><li><a href="https://github.com/maravento/blackweb">Blackweb Project</a>: Optimized for <a href="http://www.squid-cache.org/">Squid</a></li><li><a href="http://support.clean-mx.de/clean-mx/viruses">CLEAN-MX Realtime Database</a>: XML output available</li><li><a href="https://intel.criticalstack.com/">CriticalStack Intel Marketplace</a>: Registration required; optimized for <a href="https://www.bro.org/">Bro</a></li><li><a href="https://www.team-cymru.com/bogon-reference.html">CYMRU Bogon List</a></li><li><a href="http://www.dshield.org/ipsascii.html">DShield Blocklist</a></li><li><a href="http://iplists.firehol.org/">FireHOL IP Lists</a>: Combines several blocklists from other sources</li><li><a href="http://code.google.com/apis/safebrowsing/">Google Safe Browsing API</a>: Programmatic access; restrictions apply</li><li><a href="http://hosts-file.net/">hpHosts File</a>: Limited automation on request</li><li><a href="http://malc0de.com/database/">Malc0de Database</a></li><li><a href="http://www.malwaredomains.com/wordpress/?page_id=66">Malware Domain Blocklist</a>: Free for non-commercial use</li><li><a href="http://www.malwaredomainlist.com/hostslist/hosts.txt">MalwareDomainList.com Hosts List</a></li><li><a href="http://www.malware.com.br/open-source.shtml">Malware Patrol's Malware Block Lists</a>: Free for non-commercial use</li><li><a href="http://www.malwareurl.com/">MalwareURL List</a>: Commercial service; free licensing options may be available</li><li><a href="http://openphish.com/">OpenPhish</a>: Phishing sites; free for non-commercial use</li><li><a href="http://www.phishtank.com/phish_archive.php">PhishTank Phish Archive</a>: Query database via API</li><li><a href="http://www.projecthoneypot.org/list_of_ips.php">Project Honey Pot's Directory of Malicious IPs</a>: Registration required to view more than 25 IPs</li><li><a href="https://riskdiscovery.com/honeydb/#threats">Risk Discovery</a>: Programmatic access, based on HoneyPy data</li><li><a href="http://www.scumware.org/">Scumware.org</a></li><li><a href="http://www.shadowserver.org/wiki/pmwiki.php?n=Services/Reports">Shadowserver IP and URL Reports</a>: Registration and approval required</li><li><a href="https://github.com/pallebone/StrictBlockPAllebone">StrictBlockPAllebone</a></li><li><a href="https://urlhaus.abuse.ch/browse/">URLhaus</a>: Programmatic access available</li><li><a href="http://www.voipbl.org/">VoIP Blacklist</a>: Specific to VoIP abusers</li><li><a href="http://www.BlockList.de">www.BlockList.de</a></li></ul><p>The lists differ in format, goals, and data collection methodology. Be sure to read about the list before making use of it. Did you notice any blocklist sources that should be on this list, but are missing? Let me know. My other lists of on-line security resources outline <a href="/automated-malware-analysis/">Automated Malware Analysis Services</a> and <a href="/lookup-malicious-websites/">On-Line Tools for Malicious Website Lookups</a>.</p><div class="update"> Updated <span class="post-date updated">July 13, 2021</span></div><span class="vcard author post-author"> <span class="fn">Lenny Zeltser</span> </span></div><div class="category-post-footer keyline-top keyline-bottom"> {/html} https://zeltser.com/malicious-ip-blocklists/ https://zeltser.com/lookup-malicious-websites/
Password
Summary of changes
📜
⏱️
⬆️